Security and Privacy Terms
Welcome to the Aursec Security and Privacy Glossary. This page is designed to help you understand common terms related to data protection and cybersecurity. Clear definitions will aid in better understanding the services we offer and the measures we take to protect your valuable information.
Access Control
The process of granting or denying specific requests to obtain and use information and related information processing services. It also includes the process of granting or denying specific requests to enter specific physical facilities.
Authentication
The process of verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
Data Breach
A security incident in which information is accessed without authorisation. This can involve the loss, theft, or exposure of data to unauthorised individuals.
Data Encryption
The process of converting information or data into a code, especially to prevent unauthorised access.
Data Protection
The process of safeguarding important information from corruption, compromise, or loss. Measures include encryption, backups, and access controls.
Firewall
A network security device that monitors and filters incoming and outgoing network traffic based on an organisation’s previously established security policies.
GDPR (General Data Protection Regulation)
A regulation in EU law on data protection and privacy in the European Union and the European Economic Area. It also addresses the transfer of personal data outside the EU and EEA areas.
Malware
Short for malicious software, malware refers to software designed to disrupt, damage, or gain unauthorised access to a computer system.
Phishing
A method of trying to gather personal information using deceptive e-mails and websites. Phishing is often used to steal data such as login credentials and credit card numbers.
Privacy Policy
A statement or a legal document that discloses the ways a party gathers, uses, discloses, and manages a customer or client’s data.
Ransomware
A type of malicious software designed to block access to a computer system until a sum of money is paid.
Social Engineering
A method of deceiving individuals into divulging confidential or personal information that may be used for fraudulent purposes.
Two-Factor Authentication (2FA)
A security process in which the user provides two different authentication factors to verify themselves. This process is used to better protect both the user’s credentials and the resources the user can access.
VPN (Virtual Private Network)
A service that encrypts your internet connection and hides your online identity. VPNs make it more difficult for third parties to track your activities online and steal data.
Vulnerability
A weakness in a system or application that can be exploited to gain unauthorised access or cause harm.